Beschreibung: | Description:
The remote host is missing an update to php announced via advisory MDKSA-2003:082.
A vulnerability was discovered in the transparent session ID support in PHP4 prior to version 4.3.2. It did not properly escape user- supplied input prior to inserting it in the generated web page. This could be exploited by an attacker to execute embedded scripts within the context of the generated HTML (CVE-2003-0442).
As well, two vulnerabilities had not been patched in the PHP packages included with Mandrake Linux 8.2: The mail() function did not filter ASCII control filters from its arguments, which could allow an attacker to modify the mail message content (CVE-2002-0986). Another vulnerability in the mail() function would allow a remote attacker to bypass safe mode restrictions and modify the command line arguments passed to the MTA in the fifth argument (CVE-2002-0985).
All users are encouraged to upgrade to these patched packages.
Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1, Multi Network Firewall 8.2
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:082 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0442 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0985 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0986
Risk factor : High
CVSS Score: 7.5
|